NT nightmares

NT nightmares

For IT professionals, there can be no ignoring the things that go bump in the night. And for those running...

September 9th, 1999 John Fontana

Corel Linux focuses on front end

Corel Linux focuses on front end

Microsoft Windows users will recognize some of the features in the upcoming version of Corel Linux from Corel Corp., which...

September 9th, 1999 Rebecca Maxwell

For your eyes only

For your eyes only

E-commerce is like the proverbial tracks that run through town, dividing the seamy from the respectable. On one side, where...

September 9th, 1999 Michael MacMillan

Camp site filled with in-demand IT talent

Camp site filled with in-demand IT talent

Most of the attendees at the first annual Chaos Communication Camp in Altlandsberg, Germany, were young, skilful and in high...

August 26th, 1999 Ann Harrison

So who

So who

E-commerce is sexy. All those dollars spinning across the Web - who doesn't want that? Contingency planning, however, is as...

August 26th, 1999 Peter Wolchak

Symantec

Symantec

Hackers broke into Symantec Corp.'s European Web site on Aug. 2 and posted messages claiming they had infected the entire...

August 26th, 1999 Kimberly Chapman

The storage fingerprint: complicated and unique

The storage fingerprint: complicated and unique

From business-critical, decision-support information to endless amounts of possibly useful customer data, companies today are storing more information than many...

August 26th, 1999 Kimberly Chapman

What is the best approach to enterprise caching?

What is the best approach to enterprise caching?

For networks with relatively low performance and reliability demands, proxy servers may make sense. But for companies that count on...

August 26th, 1999 Solom Heddaya

Anti-virus vendors target Exchange

Anti-virus vendors target Exchange

Learning from Melissa and Worm.ExploreZip, Trend Micro and Network Associates Inc. (NAI) are both producing anti-virus applications for use with...

August 12th, 1999 Matthew Nelson